Hacker News
- Why I'm Writing a Book on Cryptography (2020) https://www.cryptologie.net/article/504/why-im-writing-a-book-on-cryptography/ 8 comments
- "This destroyes the RSA cryptosystem" https://www.cryptologie.net/article/515/this-destroyes-the-rsa-cryptosystem/ 10 comments
- Developers Are Not Idiots https://www.cryptologie.net/article/466/developers-are-not-idiots 76 comments
- Dual EC or the NSA's Backdoor: Explanations [video] https://www.cryptologie.net/article/287/dual-ec-or-the-nsas-backdoor-explanations/ 20 comments
- Let's Encrypt Overview http://www.cryptologie.net/article/274/lets-encrypt-overview/ 114 comments
Lobsters
- Developers Are Not Idiots https://www.cryptologie.net/article/466/developers-are-not-idiots 13 comments practices
- Simple introduction to monads in OCaml https://www.cryptologie.net/article/578/simple-introduction-to-monads-in-ocaml/ 5 comments ocaml
- What's the deal with the "zkapps" mentioned by Vitalik? https://www.cryptologie.net/article/575/whats-the-deal-with-zkapps/ 7 comments ethereum
- What's the deal with zkapps? https://www.cryptologie.net/article/575/whats-the-deal-with-zkapps/ 16 comments cryptocurrency
- OCaml wishlist https://www.cryptologie.net/article/574/ocaml-wishlist/ 17 comments ocaml
- The code is the specification? Introducing cargo spec https://www.cryptologie.net/article/553/the-code-is-the-specification-introducing-cargo-spec/ 7 comments rust
- How does the PLONK zero-knowledge proof system work? Part 1: What's PLONK? https://www.cryptologie.net/article/529/how-does-plonk-work-part-1-whats-plonk/ 23 comments crypto
- Why I’m Writing A Book On Cryptography https://www.cryptologie.net/article/504/ 9 comments netsec
- Why I’m Writing A Book On Cryptography https://www.cryptologie.net/article/504/why-im-writing-a-book-on-cryptography/ 6 comments netsec
- Why I’m Writing A Book On Cryptography https://www.cryptologie.net/article/504/why-im-writing-a-book-on-cryptography/ 8 comments crypto
- User Authentication with Passwords, What's SRP? https://www.cryptologie.net/article/503/user-authentication-with-passwords-whats-srp/ 64 comments crypto
- Alternatives to PGP https://www.cryptologie.net/article/502/alternatives-to-pgp/ 47 comments crypto
- Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens https://www.cryptologie.net/article/501/hardware-solutions-to-highly-adversarial-environments-part-3-trusted-execution-environment-tee-sgx-trustzone-and-hardware-security-tokens/ 4 comments crypto
- EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF? https://www.cryptologie.net/article/497/eddsa-ed25519-ed25519-ietf-ed25519ph-ed25519ctx-hasheddsa-pureeddsa-wtf/ 6 comments crypto
- What's a key exchange? https://www.cryptologie.net/article/496/whats-a-key-exchange/ 9 comments crypto
- Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt https://www.cryptologie.net/article/495/cryptographic-signatures-surprising-pitfalls-and-letsencrypt/ 3 comments crypto
- How symmetric password-authenticated key exchanges work (sPAKE) https://www.cryptologie.net/article/490/how-symmetric-password-authenticated-key-exchanges-work-spake/ 14 comments crypto
- Authentication, What The Fuck? https://www.cryptologie.net/article/489/authentication-what-the-fuck/ 5 comments crypto
- A history of end-to-end encryption and the death of PGP https://www.cryptologie.net/article/487/a-history-of-end-to-end-encryption-and-the-death-of-pgp/ 47 comments crypto
- On Doing Research https://www.cryptologie.net/article/469/on-doing-research/ 5 comments netsec
- On Doing Research https://www.cryptologie.net/article/469/on-doing-research/ 4 comments crypto
- Developers Are Not Idiots https://www.cryptologie.net/article/466/developers-are-not-idiots 9 comments crypto
- Writing a DAPP for the Ethereum block chain https://www.cryptologie.net/article/424/writing-a-dapp-for-the-ethereum-block-chain/ 3 comments ethereum
- Attacks on Smart contracts https://www.cryptologie.net/article/423/attacks-on-ethereum-smart-contracts/ 5 comments netsec
- Attacks on smart contracts https://www.cryptologie.net/article/423/attacks-on-ethereum-smart-contracts/ 3 comments ethereum
- How did length extension attacks made it into SHA-2? https://www.cryptologie.net/article/417/how-did-length-extension-attacks-made-it-into-sha-2/ 11 comments crypto
- The Strobe Protocol Framework: an Introduction https://www.cryptologie.net/article/416/the-strobe-protocol-framework/ 5 comments crypto
- TLS 1.3 - Draft 19 https://www.cryptologie.net/article/384/tls-13-draft-19/ 7 comments crypto
- 64-bit ciphers attack in 75 hours => AES-GCM attack in 75 hours? https://www.cryptologie.net/article/370/64-bit-ciphers-attack-in-75-hours-aes-gcm-attack-in-75-hours/ 31 comments crypto
- Breaking https' AES-GCM https://www.cryptologie.net/article/361/nonce-disrespecting-adversaries-practical-forgery-attacks-on-gcm-in-tls/ 30 comments netsec
- DROWN short summary https://www.cryptologie.net/article/338/drown-attack-on-openssl/ 3 comments crypto
- Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? [video] https://www.cryptologie.net/article/292/explanation-of-my-paper-timing-and-lattice-attacks-on-a-remote-ecdsa-openssl-server-how-practical-are-they-really/ 6 comments crypto
- What is GCM? (Galois Counter Mode) [video] https://www.cryptologie.net/article/277/what-is-gcm-galois-counter-mode/ 3 comments crypto
- Let's Encrypt Overview http://www.cryptologie.net/article/274/lets-encrypt-overview/ 6 comments webdev
- Let's Encrypt Overview (Contains TL;DR/ELI5) http://www.cryptologie.net/article/274/lets-encrypt-overview/ 12 comments netsec